Security Policy

Security Policy

Nothing is more important than protecting our customers’ data. We adhere to enterprise-class security levels and highest encryption standards to keep customer data secure at all times. We apply GDPR rules for all customers.

Data centers

All Databox products run on best-in-class servers in Amazon AWS data centers located in United States of America. All Amazon AWS services are GDPR compliant. Customer data is always protected and never leaves data centers.

Host security

Servers are configured as bastion hosts with each server containing only the services it absolutely needs. No other software is added to the host to lessen the security penetration surface.

Databox software infrastructure is comprised of many microservices. Each microservice is isolated and ran on a specific docker host. Hosts are dynamically scaled depending on load.

Network security

Network security follows a multi-layered approach:

At the top we use Amazon’s Virtual Private Cloud (VPC) utilizing its own security measures and principles

Security groups are assigned to each instance type, permitting only networks and ports absolutely needed for each instance type to function

Each instance has its own system firewall to protect its services even further

At the single network point of entry, the network intrusion detection & prevention system is installed, with active monitoring, filtering and alerting system.

Every connection to our hosts is SSL encrypted using a proven, peer-reviewed and open source encryption algorithms to prevent network sniffing, injecting and other attacks

Data Storage

Monitoring

We use on-site and off-site monitoring and alerting tools 24/7. We try to detect every anomaly which could affect our services, before it becomes an issue. Personnel is always available for urgent issues, which are escalated up the chain as necessary.

We strive for 99.99% uptime for all our products.

Penetration testing

Although our services are regularly upgraded, configured and monitored, regular penetration tests are employed to identify and remedy potential security issues. We try to perform such penetration tests at least on quarterly basis.

Internal IT Security

Critical passwords are secured in a virtual vault, using strong encryption protocols. Access is granted to authorised and qualified personnel only, on need-to-know basis.

Data protection, Disaster Recovery & Data Continuity

Production data is mirrored to multiple servers in a master/slave fashion. In case of an instance failure, other instances take over the load. New instance is launched, which then resyncs data and rejoins the cluster.

Backups are taken on a daily basis, some more often, depending on sensitivity of data. Backups are securely stored on encrypted storage in a GDPR compliant datacenter.

We test our recovery operations and backup quality by regular data recovery. Minimum data recovery is seven days, up to 30 days of retention. GDPR requirements are followed.

Certificates, compliance

As all software and customer data resides only in Amazon AWS infrastructure, AWS security certification compliance applies. Amazon AWS is certified with the following certificates, among others: